Debian

Debian Linux

9144 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 3.37%
  • Veröffentlicht 21.09.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 05:06:33

Insufficient policy validation in serial in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.

Exploit
  • EPSS 1.51%
  • Veröffentlicht 21.09.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 05:06:33

Insufficient policy enforcement in extensions in Google Chrome prior to 85.0.4183.121 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.

Exploit
  • EPSS 2.69%
  • Veröffentlicht 21.09.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 05:06:33

Insufficient data validation in media in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

  • EPSS 0.17%
  • Veröffentlicht 18.09.2020 18:15:16
  • Zuletzt bearbeitet 21.11.2024 05:03:09

A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be ful...

  • EPSS 2.16%
  • Veröffentlicht 17.09.2020 19:15:13
  • Zuletzt bearbeitet 21.11.2024 05:16:00

FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration.

  • EPSS 0.19%
  • Veröffentlicht 17.09.2020 19:15:12
  • Zuletzt bearbeitet 21.11.2024 04:53:30

In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: Andr...

  • EPSS 0.12%
  • Veröffentlicht 17.09.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 04:39:41

An issue was discovered in the DBI module before 1.643 for Perl. The hv_fetch() documentation requires checking for NULL and the code does that. But, shortly thereafter, it calls SvOK(profile), causing a NULL pointer dereference.

  • EPSS 0.04%
  • Veröffentlicht 16.09.2020 14:15:12
  • Zuletzt bearbeitet 21.11.2024 05:03:09

A buffer overflow was found in perl-DBI < 1.643 in DBI.xs. A local attacker who is able to supply a string longer than 300 characters could cause an out-of-bounds write, affecting the availability of the service or integrity of data.

  • EPSS 0.55%
  • Veröffentlicht 16.09.2020 13:15:11
  • Zuletzt bearbeitet 21.11.2024 05:03:09

A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.

  • EPSS 0.1%
  • Veröffentlicht 16.09.2020 13:15:11
  • Zuletzt bearbeitet 21.11.2024 05:03:09

An untrusted pointer dereference flaw was found in Perl-DBI < 1.643. A local attacker who is able to manipulate calls to dbd_db_login6_sv() could cause memory corruption, affecting the service's availability.